End-to-end communications security  The end-to-end approach is key for todays enterprises.This includes securing all files and data transmissions from the source to the destination, not just within the perimeter or from firewall to firewall.This approach secures all data from application server-to-user, or from any combination of two secure endpoints exchanging information throughout the enterprise internal network and through the Internet between systems at different physical sites.

Multi-platform support  Resellers need to make sure that the enterprise security solution they recommend is capable of integrating data communications across heterogeneous IT environments, including Windows, UNIX, Linux, and IBM mainframe systems.

Robust encryption  It is important to encrypt all data and file transmissions across the multi-site, diverse platform enterprise network.This requires a new class of nimble, yet powerful technologies to accommodate the broad range of system platforms, as well as new and rapidly evolving applications.

Secure remote access  Since remote PCs, laptops, PDAs, and smart phones often have access to core enterprise data, they must be treated in the same way as systems located on the enterprise LAN.Enterprise security must include encryption and authentication techniques for all devices that may allow users to access the internal network.Automated management capabilities  Monitoring and maintaining large enterprise security systems can be very time consuming for IT managers. This can often lead to delays in deploying critical security patches as new vulnerabilities are uncovered.Therefore, it is important for the reseller to look for solutions offering some type of efficient, easy-to-use management capabilities.For example, some vendors offer automated security platforms that enable management from a central location.This type of system not only minimizes the time required to maintain the security system by an order of magnitude, but it also reduces overhead costs and the potential for human error.

Government regulations and industry standards  Existing and emerging privacy, security, auditing, and risk management regulations and standards, such as Sarbanes-Oxley Act (SOX), the Payment Card Industry Data Security Standard (PCI DSS), and the Federal Information Security Management Act (FISMA), are increasingly required for enterprises of all types.Resellers must be familiar with these and the other regulations governing their clients businesses, and make sure that the recommended security solutions include support for the latest standards and specifications.

Improved client service is only one of the benefits for the reseller who expands his or her knowledge of the enterprise IT security landscape. Revenue generation through new or additional professional services offerings is another benefit.

For those integrators and VARs that offer supplemental professional services as part of their businesses, they will find that reselling enterprise security opens up the possibility for new streams of ongoing revenue. From integration, customization and consulting services, to comprehensive IT staff training, the opportunities can be virtually endless.

While some client IT personnel will need a minimum level of support, others will require an in-depth ongoing commitment  particularly given that the IT security landscape changes so frequently, security threats constantly evolve, and government regulations and industry standards are subject to change over time.

In addition, resellers may find that the enterprise infrastructure expands following the initial deployment, which will require added IT security product and service support.

As one of the driving forces in the enterprise security market, resellers are frequently the main point of contact for enterprise IT purchasing decision makers.With relationships built over time, based on past successes, the reseller can be in an ideal position to help enterprise customers effectively meet the IT security challenges ahead.

However, as in many business situations, knowledge is key. For the reseller, understanding todays security landscape is job one. By utilizing vendors skilled knowledge and research, as well as going the extra mile to enhance the services they already provide, resellers can dramatically improve the level of guidance and support for their customers.